Tag: windows
-
APT37 Deploys New Rust and Python Malware Targeting Windows Systems
The North Korean-aligned threat group APT37, also known as ScarCruft, Ruby Sleet, and Velvet Chollima, has evolved its cyber warfare capabilities by deploying sophisticated Rust and Python-based malware in recent campaigns targeting Windows systems. Active since 2012, this advanced persistent threat group continues to focus on South Korean individuals connected to the North Korean regime…
-
Exploit-Analyse von Kaspersky – Die beliebtesten Windows- und Linux-Schwachstellen
First seen on security-insider.de Jump to article: www.security-insider.de/steigende-cyberangriffe-windows-linux-schwachstellen-kaspersky-warnung-a-4ffbb12393a1344c6e1b989d1a7fea68/
-
Exploit-Analyse von Kaspersky – Die beliebtesten Windows- und Linux-Schwachstellen
First seen on security-insider.de Jump to article: www.security-insider.de/steigende-cyberangriffe-windows-linux-schwachstellen-kaspersky-warnung-a-4ffbb12393a1344c6e1b989d1a7fea68/
-
Hackers Promote Gambling Websites With SEO Poisoning
GhostRedirector Compromising Windows Servers in Brazil, Thailand and Vietnam. A suspected Chinese cybercrime group is deploying custom malware to compromise Windows servers in Brazil, Thailand, Portugal and Vietnam as part of search engine optimization fraud to promote gambling websites. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/hackers-promote-gambling-websites-seo-poisoning-a-29389
-
‘MostereRAT’ Malware Blends In, Blocks Security Tools
A threat actor is using a sophisticated EDR-killing malware tool in a campaign to maintain long-term, persistent access on Windows systems. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/mostererat-blocks-security-tools
-
MostereRAT Targets Windows, Uses AnyDesk and TightVNC for Full Access
MostereRAT malware targets Windows through phishing, bypasses security with advanced tactics, and grants hackers full remote control. Cybersecurity… First seen on hackread.com Jump to article: hackread.com/mostererat-windows-anydesk-tightvnc-access/
-
MostereRAT Targets Windows, Uses AnyDesk and TightVNC for Full Access
MostereRAT malware targets Windows through phishing, bypasses security with advanced tactics, and grants hackers full remote control. Cybersecurity… First seen on hackread.com Jump to article: hackread.com/mostererat-windows-anydesk-tightvnc-access/
-
MostereRAT Targets Windows Users With Stealth Tactics
Phishing campaign unveiled MostereRAT, targeting Windows systems with advanced evasion techniques First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/rat-targets-windows-users-stealth/
-
Using Programmable Tokens for Secure Windows Login
Enhance Windows security using programmable tokens for multi-factor authentication. Learn how to set up and use hardware tokens for a more secure login process. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/using-programmable-tokens-for-secure-windows-login/
-
(g+) Cloud: Windows 365 als PC – taugt das was?
Windows 365 ist wie Strom aus der Steckdose statt eines eigenen Generators. Was IT-Entscheider über die vielen Vor- und Nachteile wissen müssen. First seen on golem.de Jump to article: www.golem.de/news/cloud-windows-365-als-pc-taugt-das-was-2509-199832.html
-
GhostRedirector: Hacker manipulieren Google-Suchergebnisse
Eine neu entdeckte Hackergruppe missbraucht weltweit Windows-Server für SEO-Betrug. Mit zwei eigens entwickelten Tools bringen die Angreifer zwielichtige Websites in Google-Suchergebnissen nach oben monatelang unentdeckt. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/ghostredirector-google
-
Windows starts asking for admin rights where it shouldn’t after security fix
Patch closes vuln but leaves standard users locked out of common apps First seen on theregister.com Jump to article: www.theregister.com/2025/09/04/windows_admin_rights_bug/
-
Schonfrist für Windows 10: Wie du den Support bis Oktober 2026 verlängern kannst
Tags: windowsFirst seen on t3n.de Jump to article: t3n.de/news/schonfrist-fuer-windows-10-1700273/
-
Firefox 115 ESR: Windows 7/8.1-Support bis März 2026
Der Mozilla Firefox 115 ESR läuft unter Windows 7 / 8.1 und befindet sich seit länger Zeit im erweiterten Support. Bisher war bekannt, dass die Entwickler diese Browser-Version bis zum September 2025 unterstützen möchten. Nun haben die Mozilla-Entwickler bestätigt, dass … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/09/06/firefox-115-esr-windows-7-8-1-support-bis-maerz-2026/
-
Raw Disk Reads: The EDR Blind Spot Threat Actors Love
Attackers use raw disk reads to evade EDR and steal Windows credential files, exposing a major blind spot in enterprise defenses. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/edr-blind-spots-workday/
-
‘SEO fraud-as-a-service’ scheme hijacks Windows servers to promote gambling websites
A malware campaign dubbed GhostRedirector by researchers at ESET attempts to compromise websites to drive traffic to gambling sites. First seen on therecord.media Jump to article: therecord.media/seo-scheme-windows-malware-gambling-sites-ghostredirector
-
‘SEO fraud-as-a-service’ scheme hijacks Windows servers to promote gambling websites
A malware campaign dubbed GhostRedirector by researchers at ESET attempts to compromise websites to drive traffic to gambling sites. First seen on therecord.media Jump to article: therecord.media/seo-scheme-windows-malware-gambling-sites-ghostredirector
-
‘SEO fraud-as-a-service’ scheme hijacks Windows servers to promote gambling websites
A malware campaign dubbed GhostRedirector by researchers at ESET attempts to compromise websites to drive traffic to gambling sites. First seen on therecord.media Jump to article: therecord.media/seo-scheme-windows-malware-gambling-sites-ghostredirector
-
Supportende: Windows-10-Updates kosten Unternehmen künftig Milliarden
Analysten schätzen, dass Microsoft mit ESU-Lizenzen für Windows 10 allein im ersten Jahr mehr als 6 Milliarden Euro einnimmt. First seen on golem.de Jump to article: www.golem.de/news/supportende-windows-10-updates-kosten-unternehmen-kuenftig-milliarden-2509-199822.html
-
New Malware Exploits Windows Character Map to Evade Defender and Mine Crypto
A sophisticated cryptojacking campaign that hijacks Windows’ native Character Map utility (“charmap.exe”) to evade Windows Defender and covertly mine cryptocurrency on compromised machines. First detected in late August 2025, this attack exploits legitimate system binaries to load a custom cryptomining payload directly into memory, thwarting traditional antivirus signatures and curtailing forensic artifacts. Security researchers have…
-
Neue Hacker-Gruppe GhostRedirector vergiftet Windows-Server
ESET Forscher haben eine neue Hackergruppe identifiziert, dieWindows-Server mit einer passiven C++-Backdoor und einem bösartigen IIS-Modul angreift. Ihr Ziel: die Manipulation von Google-Suchergebnissen First seen on welivesecurity.com Jump to article: www.welivesecurity.com/de/eset-research/neue-hacker-gruppe-ghostredirector-vergiftet-windows-server/
-
Hackers Exploit Raw Disk Reads to Evade EDR and Steal Sensitive Files
Attackers can bypass Endpoint Detection and Response (EDR) tools and file locks by reading raw disk sectors directly, highlighting the urgent need for organizations to audit and secure the drivers installed on their Windows systems. In modern Windows environments, drivers provide low-level access to hardware and disk functions. A recent investigation by Workday’s Offensive Security…
-
Windows Heap Buffer Overflow Vulnerability Allows Attackers to Gain Elevated Privileges
A critical security vulnerability has been discovered in Microsoft Windows systems that allows attackers to escalate their privileges and potentially gain complete control over affected machines. The vulnerability, designatedCVE-2025-53149, affects the Kernel Streaming WOW Thunk Service Driver and was patched by Microsoft in August 2025. Vulnerability Overview The security flaw is a heap-based buffer overflow located in…
-
Windows Heap Buffer Overflow Vulnerability Allows Attackers to Gain Elevated Privileges
A critical security vulnerability has been discovered in Microsoft Windows systems that allows attackers to escalate their privileges and potentially gain complete control over affected machines. The vulnerability, designatedCVE-2025-53149, affects the Kernel Streaming WOW Thunk Service Driver and was patched by Microsoft in August 2025. Vulnerability Overview The security flaw is a heap-based buffer overflow located in…

